Font Size: a A A

Research On Architecture And Key Mechanisms Of Trusted Middleware

Posted on:2008-11-02Degree:MasterType:Thesis
Country:ChinaCandidate:X XiaoFull Text:PDF
GTID:2178360242972346Subject:Military Equipment
Abstract/Summary:PDF Full Text Request
Trusted computing technology concentrates on solving the information security problems from foundation level, and takes major insecure factors into control from the source of computer, sequentially ensures the security and reliability of information. The core of the trusted computing technology is the trusted computing platform, which is a new generational software and hardware platform that can provide trusted computing service, it bases on trusted platform module, takes cryptogram technology as the support, takes secure operating system as the core, ensures the information security from the system structure. Now, the trusted computing platform technology has become a popular research area. However, the trusted computing platform can not provide enough transparency and scalability to the user and application, especially in the distributed environment it doesn't provide a set of execution and development interfaces for the upper application, thus reduces the quality and maintainability of the trusted system.The middleware technology currently is the mature technology that solves the distributed application, it provides portability, interoperability, scalability and availability for the distributed environment application. But along with the high-speed development of the computing application, the middleware has a higher request on the security and reliability, and needs a new technology to solve this problem.According to the two questions, a few companies proposes the definition of the trusted middleware in order to satisfy the application system to the trust and interoperability, but the research of the trusted middleware mainly is the engineering introducation based on the TCG criterion, and do not proposes the definition,architecture and main mechanisms of the trusted middleware. Accordingly this paper researches the basic theory of the trusted middleware in detail.Main works of this paper are listed as follow1. With the analysis of the trusted computing technologies, this paper gives the description and definition of trusted subject, trustworthy and trusted software, which are relative to the trusted computing.2. Combining the trusted computing and middleware technology, this paper gives the definition of the trusted middleware, and detailedly introduces the architecture of the trusted middleware,3. This paper analyses several key mechanisms of the trusted middleware.4. Based on above researches, the paper introduces a system realization model based on trusted computing platform, gives the detailed design of its every module. 5. Finally this paper gives the concrete design and realization of the trusted cryptogram services provider (TCSP) module in the above-mentioned system model.
Keywords/Search Tags:Middleware, Trusted Computing, Trusted Middleware, Trusted Computing Platform, TCG, TSS
PDF Full Text Request
Related items